Professional Documents
Culture Documents
Copyright: © the author(s), publisher and licensee Technoscience Academy. This is an open-access article distributed 458
under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-
commercial use, distribution, and reproduction in any medium, provided the original work is properly cited
Rutuja Bankar et al Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., November-December-2022, 8 (6) : 458-463
provide multiple security in various practices like consuming for taking attendance. The main purpose is
verification of identity, access authority, observation, to develop a reliable system by using deep learning.
to replace passwords and identity cards that are no The system will record the attendance of the student
longer safe. The use of face recognition has the automatically by matching from the training data-set.
benefit of verifying personal data because inhuman
faces things like irises, retinas, and faces are very II. METHODOLOGY
unique to each other. FaceNet
FaceNet was built by Google researchers using a Deep
Convolutional Neural Network (DCNN) that maps
images of a person's face into Euclidean spaces
(collections of geometrical points) which are also
called embedding.
also pursued by the triplet loss when the training inputs for face detection and recognition and as well
process. creates multiple copies of the proposed images.
The second neural network, R-Net, is known as the
refine network. It feeds on the proposed image inputs
from P-Net and refines by filtering the false candidate
inputs from the true candidates.
Triplet loss training methods have three main
The third and last neural network, O-Net, does the
elements namely anchor, positive and negative. This
rest of the job. It concludes the operation by finding
triplet loss works by minimizing the distance between
five facial landmarks among the candidate image
anchors positively and maximizing the distance
inputs. A facial landmark contains key features of the
between anchors negatively. Where this positive has
human face.
the same identity as the anchor and negative has a
different identity from the anchor.
V. REFERENCES
[7]. Thida Nyein, Aung Nway Oo, “University posteriori model adaptation. IEEE Transactions
Classroom Attendance System Using FaceNet on Pattern Analysis and Machine Intelligence,
and Support Vector Machine”. 29(4):743–748, April 2007.
[8]. Florian Schroff, Dmitry Kalenichenko, James
Philbin, “FaceNet: A Unified Embedding for Cite this article as :
Face Recognition and Clustering”, CVPR2015.
[9]. S. S. Thomas, S. Gupta and V. K. Subramanian, Rutuja Bankar, Nikita Bargat, Isha Hanmante, Prof.
"Smart surveillance based on video Hemlata Dakore, "Face Recognition Using Facenet
summarization," 2017 IEEE Region 10 Deep Learning Network for Attendance System",
Symposium (TENSYMP), Cochin, 2017, pp. 1-5. International Journal of Scientific Research in
doi: 10.1109/TENCONSpring.2017.8070003 Computer Science, Engineering and Information
[10]. Kaipeng Zhang, Zhanpeng Zhang, Zhifeng Li: Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 8
“Joint Face Detection and Alignment using Issue 6, pp. 458-463, November-December 2022.
Multi-task Cascaded Convolutional Networks”, Available at doi :
2016; [http://arxiv.org/abs/1604.02878 https://doi.org/10.32628/CSEIT228630
arXiv:1604.02878]. DOI: Journal URL : https://ijsrcseit.com/CSEIT228630
[https://dx.doi.org/10.1109/LSP.2016.260334210
.1109/LSP.2016.2603342].
[11]. S. D. Shendre, “An Efficient way to Trace
Human by Implementing Face Recognition
Technique using TensorFlow and FaceNet API,”
International Journal for Research in Applied
Science and Engineering Technology, vol. 6, no.
4, pp. 605–608, 2018.
[12]. Z. He, M. Kan, J. Zhang, X. Chen, S. Shan, A
fully end-to-end cascaded cnn for facial
landmark detection, in: IEEE International
Conference on Automatic Face Gesture
Recognition (FG), 2017, pp. 200–207.
[13]. I. Masi, S. Rawls, G. Medioni, P. Natarajan,
Pose-aware face recognition in the wild, in:
IEEE Conference on Computer Vision and
Pattern Recognition (CVPR), 2016, pp. 4838–
4846.
[14]. Gary B. Huang, Manu Ramesh, Tamara Berg,
and Erik Learned- Miller. Labeled Faces in the
Wild: A Database for Studying Face
Recognition in Unconstrained Environments.
University of Massachusetts, Amherst,
Technical Report 07-49, October, 2007.
[15]. S. Marcel, J. R. Mill ́an. Person authentication
using brainwaves (EEG) and maximum a